Restructure omni services and add Chatwoot research snapshot
This commit is contained in:
@@ -0,0 +1,42 @@
|
||||
require 'rails_helper'
|
||||
|
||||
RSpec.describe Widget::TokenService, type: :service do
|
||||
describe 'token expiry configuration' do
|
||||
let(:service) { described_class.new(payload: {}) }
|
||||
|
||||
before do
|
||||
# Clear any existing configs to ensure test isolation
|
||||
InstallationConfig.where(name: 'WIDGET_TOKEN_EXPIRY').destroy_all
|
||||
end
|
||||
|
||||
context 'with valid configuration' do
|
||||
before do
|
||||
create(:installation_config, name: 'WIDGET_TOKEN_EXPIRY', value: '30')
|
||||
end
|
||||
|
||||
it 'uses the configured value for token expiry' do
|
||||
travel_to '2025-01-01' do
|
||||
token = service.generate_token
|
||||
decoded = JWT.decode(token, Rails.application.secret_key_base, true, algorithm: 'HS256').first
|
||||
expect(decoded['iat']).to eq(Time.zone.now.to_i)
|
||||
expect(decoded['exp']).to eq(Time.zone.now.to_i + 30.days.to_i)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
context 'with empty configuration' do
|
||||
before do
|
||||
create(:installation_config, name: 'WIDGET_TOKEN_EXPIRY', value: '')
|
||||
end
|
||||
|
||||
it 'uses the default expiry' do
|
||||
travel_to '2025-01-01' do
|
||||
token = service.generate_token
|
||||
decoded = JWT.decode(token, Rails.application.secret_key_base, true, algorithm: 'HS256').first
|
||||
expect(decoded['iat']).to eq(Time.zone.now.to_i)
|
||||
expect(decoded['exp']).to eq(Time.zone.now.to_i + 180.days.to_i)
|
||||
end
|
||||
end
|
||||
end
|
||||
end
|
||||
end
|
||||
43
research/chatwoot/spec/services/widget/token_service_spec.rb
Normal file
43
research/chatwoot/spec/services/widget/token_service_spec.rb
Normal file
@@ -0,0 +1,43 @@
|
||||
require 'rails_helper'
|
||||
|
||||
describe Widget::TokenService do
|
||||
let(:payload) { { source_id: 'contact_123', inbox_id: 1 } }
|
||||
let(:token_service) { described_class.new(payload: payload) }
|
||||
|
||||
describe 'inheritance' do
|
||||
it 'inherits from BaseTokenService' do
|
||||
expect(described_class.superclass.name).to eq('BaseTokenService')
|
||||
end
|
||||
end
|
||||
|
||||
describe '#generate_token' do
|
||||
it 'generates a JWT token with the provided payload' do
|
||||
token = token_service.generate_token
|
||||
expect(token).to be_present
|
||||
expect(token).to be_a(String)
|
||||
end
|
||||
|
||||
it 'encodes the payload correctly' do
|
||||
token = token_service.generate_token
|
||||
decoded = JWT.decode(token, Rails.application.secret_key_base, true, algorithm: 'HS256').first
|
||||
expect(decoded['source_id']).to eq('contact_123')
|
||||
expect(decoded['inbox_id']).to eq(1)
|
||||
end
|
||||
end
|
||||
|
||||
describe '#decode_token' do
|
||||
let(:token) { token_service.generate_token }
|
||||
let(:decoder_service) { described_class.new(token: token) }
|
||||
|
||||
it 'decodes a valid JWT token' do
|
||||
decoded = decoder_service.decode_token
|
||||
expect(decoded[:source_id]).to eq('contact_123')
|
||||
expect(decoded[:inbox_id]).to eq(1)
|
||||
end
|
||||
|
||||
it 'returns empty hash for invalid token' do
|
||||
invalid_service = described_class.new(token: 'invalid_token')
|
||||
expect(invalid_service.decode_token).to eq({})
|
||||
end
|
||||
end
|
||||
end
|
||||
Reference in New Issue
Block a user